• A novel approach to the security evaluation of information system is presented.

    提出一种新颖安全评估方法

    youdao

  • This article holds that the oil security evaluation index system is foundation.

    本文认为,构建石油安全评价指标体系评价工作的基础

    youdao

  • This paper introduces the ASI and its syntax, mechanism, and security evaluation.

    该文介绍ASI的概念语法机制安全评估。

    youdao

  • The "down three zone" theory provides theoretical foundation for security evaluation.

    下三带理论分析、评价底板抗突水能力提供了理论指导。

    youdao

  • The" down three zone" theory provides theoretical foundation for security evaluation.

    下三带理论为分析、价底板抗突水能力提供了理论指导。

    youdao

  • The IAHP can quantify the effect of the evaluation parameters on security evaluation results.

    改进AHP方法可以有效地量化评估参数评估结果影响

    youdao

  • The security evaluation of transmission grid is an important and frequent work for power grid business.

    输电网安全性评价电网企业安全管理一项重要经常性工作

    youdao

  • It is crucial to investigate the parameter which effect decisively on the result of security evaluation.

    研究评估参数安全评估结果影响具有重要意义

    youdao

  • At last a security evaluation to this system is given according to the current means to attack the mail system.

    最后根据当前常用的电子邮件攻击手段给出系统安全评估

    youdao

  • Recently, there has been an effort to consolidate these best practices as the Common Criteria for IT Security Evaluation (CC).

    最近,业界已经作出了很大的努力,这些最佳实践合并作为IT安全评估通用标准(Common Criteriafor IT Security Evaluation,CC)。

    youdao

  • The main research content of this paper is network information detection technology and network security evaluation method.

    本文主要研究内容网络信息探测技术建立在信息探测基础上的安全评估方法

    youdao

  • Through searching the problem of network security evaluation, this paper presents an algorithm to evaluate network security.

    网络系统安全评估问题进行了研究提出一种评估网络系统安全的新算法

    youdao

  • Due to the absence of evaluation theory, most of the security evaluation is informal, random, and low efficient in practice.

    由于当前评估理论匮乏,导致实际中相当多的安全评估规范,随意效率

    youdao

  • Compared with the existing security evaluation and forecast methods, the proposed model is more integrated, effective and accurate.

    相比已有安全态势评估预测方法模型的结构更加完整,结果更为准确有效

    youdao

  • The index of network security evaluation is used to evaluate network security and indicate the security property of telecom network.

    网络安全评估指标网络安全评估工具,是反映电信网安全属性标志。

    youdao

  • Environmental security evaluation system of high-rise buildings was established based on analysis of impact factors of environment security.

    详细分析确定高层建筑环境安全影响因子此基础上构建了高层建筑的环境安全评价体系

    youdao

  • Therefore, the analysis of influence of base rock condition on earthquake affecting coefficient is necessary for earthquake security evaluation.

    如何分析基岩条件地震影响系数影响地震安全评价的关键工作之一。

    youdao

  • Power system state estimation is the core of electric energy management system and the bases of dispatch, control, security evaluation and so on.

    电力系统状态估计电力系统调度控制安全评估等方面基础,也是电能管理系统的核心组成部分。

    youdao

  • The difficulty of network security evaluation is how to select and analyze the factors and their attributes, which are highly important to network security.

    网络安全评估难点在于如何选择分析各种影响网络安全因素及其属性

    youdao

  • Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.

    网络安全漏洞扫描脆弱性分析进行系统安全评估基础信息安全保障体系中的必要组成部分

    youdao

  • Through the analysis of Bayesian net's applicability in computer network security evaluation, this paper presents a novel method to evaluate network security.

    通过分析贝叶斯网络计算机网络安全评估中的适用性提出一种新的网络安全评估方法

    youdao

  • The fuzzy evaluation model of environment security was also built, which was expected to provide a reference to scale security evaluation of high-rise buildings.

    同时,提出了高层建筑环境安全单方面的灰色关联评价整体的模糊综合评价模型及运行步骤。

    youdao

  • In the face of these accident, setting up one intact security evaluation system to guide equipment management of enterprise become an urgent problem to be solved.

    面对这些事故建立套完整安全评估体系用于指导企业设备管理成为迫切需要解决的问题

    youdao

  • The evolution history of computer security evaluation criteria and the application of security evaluation criteria to the evaluation of security products are analyzed.

    分析计算机系统安全标准演化过程,以及安全评价标准安全产品评价中的实际应用情况。

    youdao

  • Because of explosive materials is a kind of combustible and detonable product, so it is necessary that security evaluation should be conducted systematically and seriously.

    民爆器材种广泛应用易燃易爆安全性评价系统的、细致的必要的。

    youdao

  • The paper based on the research of industrial security theory and industrial security evaluation, argues that the existing industrial security evaluation have some limited.

    本文通过产业安全理论评价研究认为现有的产业安全评价模型具有一定局限性

    youdao

  • The necessity of evaluation on the environmental security of transgenic rice plants was addressed. The author gives his personal views about the contents for security evaluation.

    阐述了转基因水稻抗病植株环境安全性评价必要性,对环境安全性评价内容提出个人观点

    youdao

  • During the process all the security evaluation information is reserved by fuzzy judgment of center of gravity, and gives prominent to key items by assignment of center of gravity.

    评价过程中通过采用模糊重心评价方法,保留了所有系统安全评价信息通过重心分配突出重要评价项目

    youdao

  • During the process all the security evaluation information is reserved by fuzzy judgment of center of gravity, and gives prominent to key items by assignment of center of gravity.

    评价过程中通过采用模糊重心评价方法,保留了所有系统安全评价信息通过重心分配突出重要评价项目

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定